Behavioral task
behavioral1
Sample
b831234eaf8ddffdaed573e993bfcf0709649dec1317029163c13e8d9c112267.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b831234eaf8ddffdaed573e993bfcf0709649dec1317029163c13e8d9c112267.exe
Resource
win10v2004-20240704-en
General
-
Target
b831234eaf8ddffdaed573e993bfcf0709649dec1317029163c13e8d9c112267
-
Size
5.9MB
-
MD5
6526e539c43825b8b70feca7419e9554
-
SHA1
3d0a999833026bca23dca0010c23cab9ff5c14af
-
SHA256
b831234eaf8ddffdaed573e993bfcf0709649dec1317029163c13e8d9c112267
-
SHA512
65087e2d7f242fa74d2493431c3660eb0714352bc18c69ffafa77df66125d4848a84e64a8d562a1eb85da78d87390694420b3704a137c0184fca5aa1d4a5602c
-
SSDEEP
98304:Pg+lFJRmJzGEMxbgrorhYjI+S4wF71FvVfllLKKseej2OJoeY0ZQwjJ+IT3IuFB:xuGrxbNlmSRZHfl0pedOJhrgw
Malware Config
Signatures
-
resource yara_rule sample vmprotect -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b831234eaf8ddffdaed573e993bfcf0709649dec1317029163c13e8d9c112267
Files
-
b831234eaf8ddffdaed573e993bfcf0709649dec1317029163c13e8d9c112267.exe windows:6 windows x64 arch:x64
c5fb5dbb27ff3c71aa60d433553373d6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ws2_32
gethostname
crypt32
CertCloseStore
wldap32
ord211
normaliz
IdnToAscii
kernel32
InitializeSListHead
FlsSetValue
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
RegisterClassExA
GetProcessWindowStation
GetProcessWindowStation
GetUserObjectInformationW
gdi32
GetDeviceCaps
advapi32
CryptHashData
shell32
ShellExecuteW
msvcp140
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_J@Z
xinput1_3
ord4
imm32
ImmReleaseContext
urlmon
URLDownloadToFileA
d3d9
Direct3DCreate9
d3dx9_43
D3DXCreateTextureFromFileA
vcruntime140_1
__CxxFrameHandler4
vcruntime140
_CxxThrowException
api-ms-win-crt-string-l1-1-0
strncpy
api-ms-win-crt-runtime-l1-1-0
_crt_atexit
api-ms-win-crt-stdio-l1-1-0
_lseeki64
api-ms-win-crt-utility-l1-1-0
rand
api-ms-win-crt-heap-l1-1-0
realloc
api-ms-win-crt-convert-l1-1-0
strtoll
api-ms-win-crt-filesystem-l1-1-0
_lock_file
api-ms-win-crt-time-l1-1-0
strftime
api-ms-win-crt-math-l1-1-0
floorf
api-ms-win-crt-locale-l1-1-0
___lc_codepage_func
wtsapi32
WTSSendMessageW
Sections
.text Size: - Virtual size: 655KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 530KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: - Virtual size: 3.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp1 Size: 5.8MB - Virtual size: 5.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 236B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ